期刊文献+

浅析软件工程需求分析与结构建设

Analysis of software engineering requirement analysis and structure construction
下载PDF
导出
摘要 软件工程飞速发展,应用于多个不同领域有着各式各样的开发标准,在软件结构建设方面同样存在一定差异。文章通过阐述软件工程需求分析含义,分析软件工程中需求分析的重要性、软件工程需求分析存在的问题,对软件工程需求分析及结构建设展开探讨,旨在为促进软件工程需求分析与结构建设的有序开展提供一些思路。 Software engineering has got a rapid development, which is applied to a variety of different areas, there are some differences in the construction of software structure. By explaining the meaning of software engineering requirement analysis, this paper analyzes the importance of requirement analysis in software engineering, existing problems of software engineering requirement analysis, and discusses the software engineering requirement analysis and structure construction, aiming at providing some ideas for promoting the demand analysis and orderly carried out software engineering structure construction.
作者 任延璞
机构地区 曲阜师范大学
出处 《无线互联科技》 2016年第22期50-52,共3页 Wireless Internet Technology
关键词 软件工程 需求分析 结构建设 software engineering requirement analysis structure construction
  • 相关文献

参考文献5

二级参考文献29

  • 1冯惠,王宝艾,韩红强.GB/T 8566《信息技术 软件生存周期过程》新版标准说明[J].信息技术与标准化,2006(8):40-44. 被引量:7
  • 2徐延章.网络办公自动化系统的核心技术[J].唐山师范学院学报,2007,29(2):79-80. 被引量:7
  • 3(美) 凯西施瓦尔贝.IT项目管理.北京:机械工业出版社,2002年.
  • 4(美) 温伯格.质量.软件.管理.北京:清华大学出版社,2005年.
  • 5Armando A, Ranise S. Automated symbolic analysis of ARBAC-policies [C] //Proc of the 6th STM'I0. Berlin:Springer, 2010:17-34.
  • 6Alberti F, Armando A, Ranise S. Efficient symbolic automated analysis of administrative attribute based RBAC policies [C]//Proc of the 6th ACM ASIACCS'll. New York: ACM, 2011:165-175.
  • 7Beeker M Y, Nanz S. A logic for state-modifying authorization policies [J].ACM Trans on Information Syslem Security, 2010, 13(3): 1-28.
  • 8Becker M Y, et al. SecPAI.: Design and semantics of a decentralized authorization language [J]. Journal of Computer Security, 2010, 18(4): 619-665.
  • 9Harrison M A, Ruzzo W L, Ullman J D. Protection in operating systems [J]. Communications of ACM, 1976, 19 (8) : 461-471.
  • 10Ravi S S. Expressive power of the schematic protection model [J]. Journal of Computer Security, 1992, 1(1): 59-98.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部